Controls enact and substantiate policies and procedures designed by management to protect information assets controls exist at both the operating system level and the application level so it is important to understand logical access controls as they apply to systems that may reside on multiple operating system platforms and involve more than . Overallit auditing using controls to protect information assets third edition by mike kegerreis et al is a comprehensive and easy to understand treatise on it auditingthis book should be in every collegiate mis program and in the possession of every it auditor and it licensed professionalmost importantly the authors explain the human relations dimensions of it auditing and practical ways to approach the audit and auditee. Secure your systems using the latest it auditing techniques fully updated to cover leading edge tools and technologies it auditing using controls to protect information assets second edition explains step by step how to implement a successful enterprise wide it audit program new chapters on auditing cloud computing outsourced operations virtualization and storage are included. It auditing using controls to protect information assets it auditing os n d2004 isbn b001ti1hng by davis c schiller m wheeler k
How it works:
1. Register Trial Account.
2. Download The Books as you like ( Personal use )